CHAPTER 20
SPAM, PHISHING, AND TROJANS: ATTACKS MEANT TO FOOL
Stephen Cobb
20.1 UNWANTED E-MAIL AND OTHER PESTS: A SECURITY ISSUE
20.2 E-MAIL: AN ANATOMY LESSON
20.2.1 Simple Mail Transport Protocol
20.3.1 Origins and Meaning of Spam (not SPAM™)
20.3.3 Spam's Two-Sided Threat
20.4.1 Enter the Spam Fighters
20.4.4 Black Holes and Block Lists
20.5.2 Growth and Extent of Phishing
20.6.2 Basic Anti-Trojan Tactics
20.6.3 Lockdown and Quarantine
20.1 UNWANTED E-MAIL AND OTHER PESTS: A SECURITY ISSUE.
Three oddly named threats to computer security are addressed in this chapter: spam, phishing, and Trojan code. Spam is unsolicited commercial e-mail. Phishing is the use of deceptive unsolicited e-mail to obtain—to fish electronically for—confidential information. Trojan code, a term derived from the Trojan horse, is software designed to achieve unauthorized access to systems by posing as legitimate applications. In this chapter, we outline the threats posed by spam, phishing, and Trojans as well as the mitigation ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.